University of Pardubice

Displaying 1-22 of 22 results

  • White Papers // Oct 2013

    Experimenting with X10 for Parallel Constraint-Based Local Search

    In this paper, the authors have investigated the adequacy of the PGAS parallel language X10 to implement a Constraint-Based Local Search solver. They decided to code in this language to benefit from the ease of use and architectural independence from parallel resources which it offers. They present the implementation strategy,...

    Provided By University of Pardubice

  • White Papers // Apr 2013

    Second-Order Analysis of the Joint SINR Distribution in Rayleigh Multiple Access and Broadcast Channels

    This paper studies the distribution of the Signal-to-Interference-plus-Noise Ratios (SINR) of users in a Rayleigh multiuser channel, using large dimensional random matrix theory. It is shown that the empirical distribution of the SINRs of the users in a Rayleigh Multiple Access Channel (MAC) with Minimum Mean Square Error (MMSE) decoding...

    Provided By University of Pardubice

  • White Papers // Nov 2012

    Adaptive-VNE: A Flexible Resource Allocation for Virtual Network Embedding Algorithm

    In this paper, the authors propose a new dynamic adaptive virtual network resource allocation strategy named Adaptive-VNE to deal with the complexity and the inefficiency of resource allocation. The proposal coordinates virtual node and virtual link mapping stages. The main idea behind the proposal is take advantage of unused bandwidth...

    Provided By University of Pardubice

  • White Papers // Nov 2012

    A Hierarchical and Multi-Criteria Knowledge Dissemination in Autonomic Networks

    Autonomic computing is a new paradigm inspired by the biological world. It aims at making a network independent of any human monitoring. To reach such autonomy, knowledge should be disseminated over the network, which remains an open problem. The authors' solution consists in proposing a new model of knowledge dissemination...

    Provided By University of Pardubice

  • White Papers // Nov 2012

    Performance Evaluation of Security Routing Strategies to Avoid DoS Attacks in WSN

    A wireless sensor Networks is a collection of simple devices with limited computation and resources. It is used to collect informations that are send back to the user. The sensed informations are real-time data streams for applications such as environmental monitoring, structural engineering, health care, VANET, and aircraft etc. The...

    Provided By University of Pardubice

  • White Papers // Sep 2012

    Summarizing and Querying Logs of OLAP Queries

    Leveraging query logs benefits the users analyzing large data warehouses with OLAP queries. But so far nothing exists to allow the user to have concise and usable representations of what is in the log. In this paper, the authors present a framework for summarizing and querying OLAP query logs. The...

    Provided By University of Pardubice

  • White Papers // Jun 2012

    Towards Verified Cloud Computing Environments

    As the usage of the cloud becomes pervasive in the people lives, it is needed to ensure the reliability, safety and security of cloud environments. In this paper, the authors study a usual software stack of a cloud environment from the perspective of formal verification. This software stack ranges from...

    Provided By University of Pardubice

  • White Papers // May 2012

    Global State-Dependent QoE Based Routing

    For years, wireless network systems have been trying to satisfy end-users and support high quality multimedia applications such as Mobile TV, VoIP, etc. Combining wireless networks with multimedia content distribution needs efficient routing protocols. The authors develop in this paper a new routing protocol, namely DOQAR (Dynamic Optimized QoE Adaptive...

    Provided By University of Pardubice

  • White Papers // May 2012

    A Novel Mechanism to Secure Internal Attacks in HWMP Routing Protocol

    Wireless Mesh networks are a new way of deployment of wireless networks. They are based on radio nodes that directly communicate and are organized as a mesh topology. The new challenges of this type of deployment could be classified as: first, the improvement of the Quality of Service (QoS) to...

    Provided By University of Pardubice

  • White Papers // May 2012

    Dynamic Solution for Detecting Denial of Service Attacks in Wireless Sensor Networks

    In this paper, the authors propose a novel dynamic approach for detecting Denial of Service (DoS) attacks in cluster-based sensor networks. Their method is based on the election of controller nodes called cNodes which observe and report DoS attack activities. Each cluster contains cNodes and normal sensor nodes. The role...

    Provided By University of Pardubice

  • White Papers // May 2012

    Strategic Subchannel Resource Allocation for Cooperative OFDMA Wireless Mesh Networks

    Wireless Mesh Networks (WMNs) are emerging as a key solution to provide broadband and mobile wireless connectivity in a flexible and cost effective way. In suburban areas, a common deployment model relies on OFDMA communications between Mesh Routers (MRs), with one MR installed at each user premises. In this paper,...

    Provided By University of Pardubice

  • White Papers // May 2012

    Dynamic Power Control With Energy Constraint for Multimedia Wireless Sensor Networks

    In recent years, many approaches and techniques have been explored for the optimization of energy usage in Wireless Sensor Networks (WSN). It is well recognized that a proper energy consumption model is the foundation for developing and evaluating a power management scheme in WSN. In this paper, the authors propose...

    Provided By University of Pardubice

  • White Papers // May 2012

    Analysis of Adjustable and Fixed DRX Mechanism for Power Saving in LTE/LTE-Advanced

    The 4G standard Long Term Evolution (LTE) has been developed for high-bandwidth mobile access for today's data-heavy applications, consequently, a better experience for the end user. To extend the user equipment battery lifetime, plus further support various services and large amount of data transmissions, the 3GPP standards for LTE/LTE-Advanced has...

    Provided By University of Pardubice

  • White Papers // May 2012

    Simplified Expression of the Average Rate of Cellular Networks Using Stochastic Geometry

    Accurate modeling of network interference, deep understanding of its impact on the achievable performance, and development of efficient techniques to mitigate or exploit it are three important and fundamental research assets in current and next - generation cellular networks. In this context, Andrews, Baccelli, and Ganti have recently introduced a...

    Provided By University of Pardubice

  • White Papers // May 2012

    Average Symbol Error Probability in the Presence of Network Interference and Noise

    In this paper, the authors introduce a new framework to compute the Average Symbol Error Probability (ASEP) of an intended wireless communication system subject to network interference and noise. The interfering nodes are assumed to be randomly distributed in the 2D Euclidean plane according to a homogeneous Poisson point process....

    Provided By University of Pardubice

  • White Papers // May 2012

    A Multi-Criteria Master Nodes Selection Mechanism for Knowledge Dissemination in Autonomic Networks

    Autonomic networks represent a concept inspired by the biological world that aims at making a network independent of any human monitoring. To reach such autonomy, knowledge should be disseminated over the network, which remains an open problem. In fact, disseminating the knowledge over all nodes leads to a big overhead....

    Provided By University of Pardubice

  • White Papers // May 2012

    Q-FCRA: QoS-Based OFDMA Femtocell Resource Allocation Algorithm

    Recently, operators have resorted to femtocell networks in order to enhance indoor coverage and increase system capacity. Nevertheless, to successfully deploy such solution, efficient resource allocation algorithms and interference mitigation techniques should be deployed. The new applications delivered by operators require large amounts of network bandwidth. Whereas, some customers may...

    Provided By University of Pardubice

  • White Papers // Feb 2011

    An Overview of Embedding Strategies in Cloud Computing Backbone Networks

    In this paper, the authors explain about virtual network embedding strategies within cloud infrastructure backbone networks. They will first of all summaries and define the main principles of cloud computing and its different supplied services. Cloud computing can be defined as the combination of three components: grid computing, cluster computing...

    Provided By University of Pardubice

  • White Papers // Sep 2010

    Web-Application User Identification

    This paper describes problems connected with web-application user identification. There are discussed some specific conditions and issues in this kind of user identification due to some features of front-end applications and application protocols used in background connection. Some tips and techniques are accentuated to use for undesirable multi-user issue detection...

    Provided By University of Pardubice

  • White Papers // May 2010

    HRIS Impacts Implementation in a SME: A Contextualist Longitudin-Al Case Study

    This paper analyses HRIS impact in a SME based on a longitudinal case study. This SME evolves in the educational sector and has just operated a fusion of four private schools. A HRIS (time management & activity software) is launched. A contextualist perspective is taken from 2002 to 2010 based...

    Provided By University of Pardubice

  • White Papers // Oct 2009

    Detection of Radio Interference Attacks in VANET

    Due to their nature, Vehicular Ad-hoc NETwork (VANET) is vulnerable to Denial of Service (DoS) attacks, such as jamming attack. The objective of a jammer is to interfere with legitimate wireless communications, and to degrade the overall QoS of the network. In this paper, the authors propose a model to...

    Provided By University of Pardubice

  • White Papers // Oct 2009

    Mezzanine Finance And Corporate Bonds

    Mezzanine finance represents a relatively new form of financing the corporate activities in local conditions of transformed economy (e.g. the Czech Republic, the Slovak Republic or Rumania). Nevertheless, one can exploit foreign experience since mezzanine finance has been commonly applied in the US since the eighties. In the nineties it...

    Provided By University of Pardubice

  • White Papers // Nov 2012

    Adaptive-VNE: A Flexible Resource Allocation for Virtual Network Embedding Algorithm

    In this paper, the authors propose a new dynamic adaptive virtual network resource allocation strategy named Adaptive-VNE to deal with the complexity and the inefficiency of resource allocation. The proposal coordinates virtual node and virtual link mapping stages. The main idea behind the proposal is take advantage of unused bandwidth...

    Provided By University of Pardubice

  • White Papers // Nov 2012

    A Hierarchical and Multi-Criteria Knowledge Dissemination in Autonomic Networks

    Autonomic computing is a new paradigm inspired by the biological world. It aims at making a network independent of any human monitoring. To reach such autonomy, knowledge should be disseminated over the network, which remains an open problem. The authors' solution consists in proposing a new model of knowledge dissemination...

    Provided By University of Pardubice

  • White Papers // Nov 2012

    Performance Evaluation of Security Routing Strategies to Avoid DoS Attacks in WSN

    A wireless sensor Networks is a collection of simple devices with limited computation and resources. It is used to collect informations that are send back to the user. The sensed informations are real-time data streams for applications such as environmental monitoring, structural engineering, health care, VANET, and aircraft etc. The...

    Provided By University of Pardubice

  • White Papers // Oct 2009

    Detection of Radio Interference Attacks in VANET

    Due to their nature, Vehicular Ad-hoc NETwork (VANET) is vulnerable to Denial of Service (DoS) attacks, such as jamming attack. The objective of a jammer is to interfere with legitimate wireless communications, and to degrade the overall QoS of the network. In this paper, the authors propose a model to...

    Provided By University of Pardubice

  • White Papers // Apr 2013

    Second-Order Analysis of the Joint SINR Distribution in Rayleigh Multiple Access and Broadcast Channels

    This paper studies the distribution of the Signal-to-Interference-plus-Noise Ratios (SINR) of users in a Rayleigh multiuser channel, using large dimensional random matrix theory. It is shown that the empirical distribution of the SINRs of the users in a Rayleigh Multiple Access Channel (MAC) with Minimum Mean Square Error (MMSE) decoding...

    Provided By University of Pardubice

  • White Papers // May 2010

    HRIS Impacts Implementation in a SME: A Contextualist Longitudin-Al Case Study

    This paper analyses HRIS impact in a SME based on a longitudinal case study. This SME evolves in the educational sector and has just operated a fusion of four private schools. A HRIS (time management & activity software) is launched. A contextualist perspective is taken from 2002 to 2010 based...

    Provided By University of Pardubice

  • White Papers // Feb 2011

    An Overview of Embedding Strategies in Cloud Computing Backbone Networks

    In this paper, the authors explain about virtual network embedding strategies within cloud infrastructure backbone networks. They will first of all summaries and define the main principles of cloud computing and its different supplied services. Cloud computing can be defined as the combination of three components: grid computing, cluster computing...

    Provided By University of Pardubice

  • White Papers // Sep 2012

    Summarizing and Querying Logs of OLAP Queries

    Leveraging query logs benefits the users analyzing large data warehouses with OLAP queries. But so far nothing exists to allow the user to have concise and usable representations of what is in the log. In this paper, the authors present a framework for summarizing and querying OLAP query logs. The...

    Provided By University of Pardubice

  • White Papers // Oct 2013

    Experimenting with X10 for Parallel Constraint-Based Local Search

    In this paper, the authors have investigated the adequacy of the PGAS parallel language X10 to implement a Constraint-Based Local Search solver. They decided to code in this language to benefit from the ease of use and architectural independence from parallel resources which it offers. They present the implementation strategy,...

    Provided By University of Pardubice

  • White Papers // Sep 2010

    Web-Application User Identification

    This paper describes problems connected with web-application user identification. There are discussed some specific conditions and issues in this kind of user identification due to some features of front-end applications and application protocols used in background connection. Some tips and techniques are accentuated to use for undesirable multi-user issue detection...

    Provided By University of Pardubice

  • White Papers // Oct 2009

    Mezzanine Finance And Corporate Bonds

    Mezzanine finance represents a relatively new form of financing the corporate activities in local conditions of transformed economy (e.g. the Czech Republic, the Slovak Republic or Rumania). Nevertheless, one can exploit foreign experience since mezzanine finance has been commonly applied in the US since the eighties. In the nineties it...

    Provided By University of Pardubice

  • White Papers // Jun 2012

    Towards Verified Cloud Computing Environments

    As the usage of the cloud becomes pervasive in the people lives, it is needed to ensure the reliability, safety and security of cloud environments. In this paper, the authors study a usual software stack of a cloud environment from the perspective of formal verification. This software stack ranges from...

    Provided By University of Pardubice

  • White Papers // May 2012

    Global State-Dependent QoE Based Routing

    For years, wireless network systems have been trying to satisfy end-users and support high quality multimedia applications such as Mobile TV, VoIP, etc. Combining wireless networks with multimedia content distribution needs efficient routing protocols. The authors develop in this paper a new routing protocol, namely DOQAR (Dynamic Optimized QoE Adaptive...

    Provided By University of Pardubice

  • White Papers // May 2012

    A Novel Mechanism to Secure Internal Attacks in HWMP Routing Protocol

    Wireless Mesh networks are a new way of deployment of wireless networks. They are based on radio nodes that directly communicate and are organized as a mesh topology. The new challenges of this type of deployment could be classified as: first, the improvement of the Quality of Service (QoS) to...

    Provided By University of Pardubice

  • White Papers // May 2012

    Dynamic Solution for Detecting Denial of Service Attacks in Wireless Sensor Networks

    In this paper, the authors propose a novel dynamic approach for detecting Denial of Service (DoS) attacks in cluster-based sensor networks. Their method is based on the election of controller nodes called cNodes which observe and report DoS attack activities. Each cluster contains cNodes and normal sensor nodes. The role...

    Provided By University of Pardubice

  • White Papers // May 2012

    Strategic Subchannel Resource Allocation for Cooperative OFDMA Wireless Mesh Networks

    Wireless Mesh Networks (WMNs) are emerging as a key solution to provide broadband and mobile wireless connectivity in a flexible and cost effective way. In suburban areas, a common deployment model relies on OFDMA communications between Mesh Routers (MRs), with one MR installed at each user premises. In this paper,...

    Provided By University of Pardubice

  • White Papers // May 2012

    Dynamic Power Control With Energy Constraint for Multimedia Wireless Sensor Networks

    In recent years, many approaches and techniques have been explored for the optimization of energy usage in Wireless Sensor Networks (WSN). It is well recognized that a proper energy consumption model is the foundation for developing and evaluating a power management scheme in WSN. In this paper, the authors propose...

    Provided By University of Pardubice

  • White Papers // May 2012

    Analysis of Adjustable and Fixed DRX Mechanism for Power Saving in LTE/LTE-Advanced

    The 4G standard Long Term Evolution (LTE) has been developed for high-bandwidth mobile access for today's data-heavy applications, consequently, a better experience for the end user. To extend the user equipment battery lifetime, plus further support various services and large amount of data transmissions, the 3GPP standards for LTE/LTE-Advanced has...

    Provided By University of Pardubice

  • White Papers // May 2012

    Simplified Expression of the Average Rate of Cellular Networks Using Stochastic Geometry

    Accurate modeling of network interference, deep understanding of its impact on the achievable performance, and development of efficient techniques to mitigate or exploit it are three important and fundamental research assets in current and next - generation cellular networks. In this context, Andrews, Baccelli, and Ganti have recently introduced a...

    Provided By University of Pardubice

  • White Papers // May 2012

    Average Symbol Error Probability in the Presence of Network Interference and Noise

    In this paper, the authors introduce a new framework to compute the Average Symbol Error Probability (ASEP) of an intended wireless communication system subject to network interference and noise. The interfering nodes are assumed to be randomly distributed in the 2D Euclidean plane according to a homogeneous Poisson point process....

    Provided By University of Pardubice

  • White Papers // May 2012

    A Multi-Criteria Master Nodes Selection Mechanism for Knowledge Dissemination in Autonomic Networks

    Autonomic networks represent a concept inspired by the biological world that aims at making a network independent of any human monitoring. To reach such autonomy, knowledge should be disseminated over the network, which remains an open problem. In fact, disseminating the knowledge over all nodes leads to a big overhead....

    Provided By University of Pardubice

  • White Papers // May 2012

    Q-FCRA: QoS-Based OFDMA Femtocell Resource Allocation Algorithm

    Recently, operators have resorted to femtocell networks in order to enhance indoor coverage and increase system capacity. Nevertheless, to successfully deploy such solution, efficient resource allocation algorithms and interference mitigation techniques should be deployed. The new applications delivered by operators require large amounts of network bandwidth. Whereas, some customers may...

    Provided By University of Pardubice